Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/03/2025, 07:14

General

  • Target

    Eac.exe

  • Size

    36KB

  • MD5

    501db7f9e10577ddf370a84a1028fd2f

  • SHA1

    65b6db50326b2cc0e6a1ab8cfd8554d2c85fb85c

  • SHA256

    482d54dbacf09579eb9983740b1b58f7aea06733bb13e4a6e6367e338e358171

  • SHA512

    f61bf3d91ed34bbf670bfd003e61aeb69d6de15b4ea66c2c9868de2d6e354b53e0a5abd756124a6dfe705caef5b85706afa507fa3e36e63ba10f100c86307d30

  • SSDEEP

    768:zuQ0MppDsoEASMBQeSJoB0MmA2K3kqgjKb+O1qyg3Y4:b0MjsRJqQw0MmA2K3ktjK4

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Drops file in System32 directory 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 8 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Eac.exe
    "C:\Users\Admin\AppData\Local\Temp\Eac.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2828
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Windows\Setup\7zip.exe" /S
      2⤵
        PID:2384
      • C:\Program Files\7-Zip\7z.exe
        "C:\Program Files\7-Zip\7z.exe" x "C:\Windows\Setup\Mapper.rar" -o"C:\Windows\Setup\Windows" -p123 -y
        2⤵
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        PID:1612
      • C:\Windows\Setup\Windows\Pub.exe
        "C:\Windows\Setup\Windows\Pub.exe"
        2⤵
        • Executes dropped EXE
        PID:624
      • C:\Program Files\7-Zip\7z.exe
        "C:\Program Files\7-Zip\7z.exe" x "C:\Windows\Setup\Pub.rar" -o"C:\Windows\Setup\Windows" -p123 -y
        2⤵
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        PID:1448
      • C:\Windows\Setup\Windows\Built.exe
        "C:\Windows\Setup\Windows\Built.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2400
        • C:\Windows\Setup\Windows\Built.exe
          "C:\Windows\Setup\Windows\Built.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:896

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      71KB

      MD5

      83142242e97b8953c386f988aa694e4a

      SHA1

      833ed12fc15b356136dcdd27c61a50f59c5c7d50

      SHA256

      d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

      SHA512

      bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9d9e717b47c0b79b479a3ba4f70c42a1

      SHA1

      2226119c91e8518ddb6e5b9e7cf664ed405a3b55

      SHA256

      da66195f1b49c8b8e846fa5439489de2b2cc4b5fa451a22b235ba4283c05c56f

      SHA512

      2b823cb0db30e2cfee9f7408fc4e6764a2dbf135fe1b12db802dc2c8f7a8a40f9cab4e3a564b4f662d6452fa219998b489df814f2c803c1d68521033a43080c9

    • C:\Users\Admin\AppData\Local\Temp\Cab9002.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar9131.tmp

      Filesize

      183KB

      MD5

      109cab5505f5e065b63d01361467a83b

      SHA1

      4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

      SHA256

      ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

      SHA512

      753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

    • C:\Users\Admin\AppData\Local\Temp\_MEI24002\api-ms-win-core-file-l1-2-0.dll

      Filesize

      21KB

      MD5

      1c58526d681efe507deb8f1935c75487

      SHA1

      0e6d328faf3563f2aae029bc5f2272fb7a742672

      SHA256

      ef13dce8f71173315dfc64ab839b033ab19a968ee15230e9d4d2c9d558efeee2

      SHA512

      8edb9a0022f417648e2ece9e22c96e2727976332025c3e7d8f15bcf6d7d97e680d1bf008eb28e2e0bd57787dcbb71d38b2deb995b8edc35fa6852ab1d593f3d1

    • C:\Users\Admin\AppData\Local\Temp\_MEI24002\api-ms-win-core-file-l2-1-0.dll

      Filesize

      18KB

      MD5

      bfffa7117fd9b1622c66d949bac3f1d7

      SHA1

      402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2

      SHA256

      1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e

      SHA512

      b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

    • C:\Users\Admin\AppData\Local\Temp\_MEI24002\api-ms-win-core-localization-l1-2-0.dll

      Filesize

      21KB

      MD5

      724223109e49cb01d61d63a8be926b8f

      SHA1

      072a4d01e01dbbab7281d9bd3add76f9a3c8b23b

      SHA256

      4e975f618df01a492ae433dff0dd713774d47568e44c377ceef9e5b34aad1210

      SHA512

      19b0065b894dc66c30a602c9464f118e7f84d83010e74457d48e93aaca4422812b093b15247b24d5c398b42ef0319108700543d13f156067b169ccfb4d7b6b7c

    • C:\Users\Admin\AppData\Local\Temp\_MEI24002\api-ms-win-core-processthreads-l1-1-1.dll

      Filesize

      21KB

      MD5

      517eb9e2cb671ae49f99173d7f7ce43f

      SHA1

      4ccf38fed56166ddbf0b7efb4f5314c1f7d3b7ab

      SHA256

      57cc66bf0909c430364d35d92b64eb8b6a15dc201765403725fe323f39e8ac54

      SHA512

      492be2445b10f6bfe6c561c1fc6f5d1af6d1365b7449bc57a8f073b44ae49c88e66841f5c258b041547fcd33cbdcb4eb9dd3e24f0924db32720e51651e9286be

    • C:\Users\Admin\AppData\Local\Temp\_MEI24002\api-ms-win-core-timezone-l1-1-0.dll

      Filesize

      21KB

      MD5

      d12403ee11359259ba2b0706e5e5111c

      SHA1

      03cc7827a30fd1dee38665c0cc993b4b533ac138

      SHA256

      f60e1751a6ac41f08e46480bf8e6521b41e2e427803996b32bdc5e78e9560781

      SHA512

      9004f4e59835af57f02e8d9625814db56f0e4a98467041da6f1367ef32366ad96e0338d48fff7cc65839a24148e2d9989883bcddc329d9f4d27cae3f843117d0

    • C:\Users\Admin\AppData\Local\Temp\_MEI24002\python311.dll

      Filesize

      1.6MB

      MD5

      bb46b85029b543b70276ad8e4c238799

      SHA1

      123bdcd9eebcac1ec0fd2764a37e5e5476bb0c1c

      SHA256

      72c24e1db1ba4df791720a93ca9502d77c3738eebf8b9092a5d82aa8d80121d0

      SHA512

      5e993617509c1cf434938d6a467eb0494e04580ad242535a04937f7c174d429da70a6e71792fc3de69e103ffc5d9de51d29001a4df528cfffefdaa2cef4eaf31

    • C:\Users\Admin\AppData\Local\Temp\_MEI24002\ucrtbase.dll

      Filesize

      992KB

      MD5

      0e0bac3d1dcc1833eae4e3e4cf83c4ef

      SHA1

      4189f4459c54e69c6d3155a82524bda7549a75a6

      SHA256

      8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae

      SHA512

      a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

    • C:\Windows\Setup\Mapper.rar

      Filesize

      8.4MB

      MD5

      f71f2cfb88da09f9189152a136e2a73a

      SHA1

      32cfe27b688d40f9f5e6ad83b677a5bb11e2c774

      SHA256

      74b0e83103ac9c6dbf376c557e60cbb75ef14c2805af7aad387c83a55f908e9d

      SHA512

      cfda37b3c7d72cd14912c5bdbbf0cc459ad84431a6dd53cec8e69bdfddaba0fd393cb501bbe362474a1bcc645b438579226ab924814ce034a8dc5fdd91dc6f77

    • C:\Windows\Setup\Pub.rar

      Filesize

      7.5MB

      MD5

      66e659d033e32611f383d9b29953432b

      SHA1

      4c9f21ad2244656591b8c1aa0a81b7fd42278aa5

      SHA256

      86953b9c75edbf77c12d2307ee18d07f35e0067a3860f10e0702dd0205b6fb23

      SHA512

      3556d7263bcd442c8fea6ae6b562331bbc9fcabd948e108c91cfe72fb279f44ddce174d3ff130ab794926473916179ba0ec0e49401d23ddee5c287907d4d4d43

    • C:\Windows\Setup\Windows\Built.exe

      Filesize

      7.7MB

      MD5

      0dac6f3979353afe030ed5fd5a1d2804

      SHA1

      cfe4fab4f59d86c97bfea9a1448c0f5a7e59025d

      SHA256

      62182a243eab225e7e83c5187249137f2e768d14e53b7cac711b860f4a68abfe

      SHA512

      b94af303ae7c97f29e3a60e4f95e473b5c8cd5690028955b6afd3c8aee3561c20a9d5d982d73c71a00f37c914a31d4d5fe4d0302d09b59b90874be75f53a6784

    • \Windows\Setup\Windows\Pub.exe

      Filesize

      8.7MB

      MD5

      06a621ee6a8f12065b1ed848656b1d70

      SHA1

      cb6da87de8d58af02562d7f4380d6f1921d67234

      SHA256

      fb402bab58e2ee836e9707ca475292f4df8bc14fcbfe638e55efbe02ec0f1d27

      SHA512

      5d28f0df41daae34122d880f0122591cc954fa577ec2b150a1cfad8bf80cb35bc379ee82870ae14014f1fbe6cc798cc4dbdae9e7745e74228e02cf362104ae10

    • memory/624-139-0x0000000140000000-0x0000000142264000-memory.dmp

      Filesize

      34.4MB

    • memory/896-222-0x000007FEF6800000-0x000007FEF6DE8000-memory.dmp

      Filesize

      5.9MB